Buch, Englisch, Band 729, 505 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 8924 g
Proceedings of CSI 2015
Buch, Englisch, Band 729, 505 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 8924 g
Reihe: Advances in Intelligent Systems and Computing
ISBN: 978-981-10-8535-2
Verlag: Springer Nature Singapore
This book comprises select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volume covers diverse topics ranging from information security to cryptography and from encryption to intrusion detection. This book focuses on Cyber Security. It aims at informing the readers about the technology in general and the internet in particular. The book uncovers the various nuances of information security, cyber security and its various dimensions. This book also covers latest security trends, ways to combat cyber threats including the detection and mitigation of security threats and risks. The contents of this book will prove useful to professionals and researchers alike.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Computerkriminalität & Hacking
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
Weitere Infos & Material
Privacy Protection Through Hiding Location Coordinates Using Geometric Transformation Techniques in Location Based Services Enabled Mobiles.- Advanced RSA Cryptographic Algorithm for Improving Data Security.- Different Security Mechanisms in Two Factor Authentication for Collaborative Computing Environment.- Changing Trend in Network Security Measures: A Review.- An Improved RED Algorithm with Input Sensitivity.- Security Attacks in Wireless Sensor Networks: A Survey.- Symmetric Key Encryption Technique: A Cellular Automata Based Approach.- A Comparative study on Lightweight Cryptography.- GPS Hash Table Based Location Identifier Algorithm For Security and Integrity Against Vampire Attacks.- Data Security Model in Cloud Computing Environment.- Review of CIDS and Techniques of Detection of Malicious Insiders in Cloud Based Environment.- DNA Based Cryptography for Security in Wireless Sensor Networks.- Privacy Preservation Using Various Anonymity Models.- A Hybrid Security Mechanism Based on DCT and Visual Cryptography for Data Communication Networks.- An Advanced Dynamic Authentic Security Method for Cloud Computing.- Security in CryptDB Using Fine Grained Access Controls with ECDHE-ZeroVi’s Framework.- Mitigating Cloud Security Threats Using Public Key Infrastructure.- Analysis and Impact of Different Mechanisms of Defending Pass the Hash Attacks.- Data Security and Encryption Technique for Cloud Storage.- Fine Grained Access Control and Secured Data Sharing in Cloud Computing.- Comparative Study of Security Risk in Social Networking and Awareness to Individual.- A Key Based Spiral Approach for DNA Cryptography.- Permission-Set Based Detection and Analysis of Android Malware.- Three Level GIS Data Security: Conjointly Cryptography and Digital Watermarking.- Digital Security an Enigma.- ICMP Flood Attacks: A Vulnerability Analysis.- Statistical Approach Using Meta Features for Android Malware Detection System.- Composite Email Features for Spam Identification.- Role of Multiple Encryption in Biometric Devices.- Buffer Overflow and SQL Injection: To Remotely Attack and Access Information.- Prime Numbers: Foundation of Cryptography.- Steganography: A Survey.- Comprehensive Methodology for Threat Identification and Vulnerability Assessment in Ad-hoc Networks.- Hardware Trojans: An Austere Menace Ahead.- Cyber Security for Supervisory Control and Data Acquisition.- k Barrier Coverage Based Intrusion Detection for Wireless Sensor Networks.- Performance Analysis of Vulnerability Detection Scanners for Web Systems.- Performance Evaluation of Multicast Source Authentication Scheme.- Design and Implementation of a Secure Hierarchical Trust Model for PKI.- Encryption and Decryption Technique Using Java.- Detection and Removal of Security Attacks Using ALARM Protocol in WSN Environment.- Encryption Technique Using Elliptic Curve Cryptography Through Compression and Artificial Intelligence.- A Robust Server-Side JavaScript Feature Injection-Based Design for JSP Web Applications Against XSS Vulnerabilities.- PHISH-SAFE: URL Features Based Phishing Detection System Using Machine Learning.- Semantic Security for Sharing Computing Knowledge/Information.- Paradigmatic Approach to Cloud Security: Challenges and Remedies.- The Digital Signature Schemes Based on Two Hard Problems: Factorization and Discrete Logarithm.- Gaussian Tendencies in Data Flow in Communication Links.